Network penetration method and device, electronic equipment and storage medium

A technology of network penetration and equipment, applied in the field of computer network

Pending Publication Date: 2022-08-02
夏宇
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These network environments will cause at least one of the two devices that need to communicate to be unable to actively initiate a network connection to the other.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network penetration method and device, electronic equipment and storage medium
  • Network penetration method and device, electronic equipment and storage medium
  • Network penetration method and device, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0038] The network penetration method provided by this application can be applied to such as figure 1 in the application environment shown. The network penetration method is applied to a network penetration device. The network penetration device may be configured on the terminal 102 or the server 104, or partially configured on the terminal 102 and partially configured on the server 104, and the terminal 102 interacts with the server 104 to complete the network penetration method.

[0039] Wherein, the terminal 102 and the server 104 can communicate through the network.

[0040] The terminal 102 can be, but is not limited to, various personal computers, notebook computers, smart phones, tablet computers and portable wearable devices. The terminal 102 needs to have the functions of receiving, viewing, editing, and sharing the shared 3D model scene. The server 104 can It can be implemented with an independent server or a server cluster composed of multiple servers.

[0041] I...

Embodiment 2

[0048] like figure 2 As shown, the network penetration method includes:

[0049] Step 210: Obtain the first device and the second device existing in the first local area network;

[0050] Step 220: According to the first device and the second device existing in the first local area network, obtain the source IP address and source port number of the intermediate server as the second network parameter.

[0051] Step 230: The second device in the first local area network uses the first network parameters as the source IP address and the source port number, and the second network parameters as the destination IP address and the destination port number to send data packets through the NAT device to reach the destination. The intermediate server, wherein the IP address of the first network parameter is the IP address of the first device; the third device in the second local area network uses the fourth network parameter as the source IP address and source port number, and the seco...

Embodiment 3

[0058] In one embodiment, an electronic device is provided, the electronic device may be a terminal, and its internal structure diagram may be as follows Figure 4 shown. The electronic device includes a processor, a memory, a communication interface, a display screen, and an input device connected by a system bus. Among them, the processor of the electronic device is used to provide computing and control capabilities. The memory of the electronic device includes a non-volatile storage medium and an internal memory. The nonvolatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the execution of the operating system and computer programs in the non-volatile storage medium. The communication interface of the electronic device is used for wired or wireless communication with an external terminal, and the wireless communication can be realized by WIFI, operator network, near field communication (NFC) or other te...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a network penetration method and device, electronic equipment and a storage medium. The method comprises the steps that first equipment and second equipment existing in a first local area network are acquired; obtaining a source IP address and a source port number of an intermediate server according to the first device and the second device existing in the first local area network; third equipment in the second local area network sends a data packet to the intermediate server after passing through the NAT equipment; the intermediate server sends a third network parameter to the third device and sends a fifth network parameter to the second device; the second device sends a data packet to the first local area network NAT device by using a second network parameter; and the third device uses a third network parameter as a destination IP address and a destination port number to send data, and establishes network communication with the first device. According to the invention, the third device actively initiating the connection participates in the network penetration process with the second device, and finally the third device establishes the connection with the first device.

Description

technical field [0001] The present invention relates to the technical field of computer networks, in particular to a network penetration method, device, electronic device and storage medium. Background technique [0002] In computer network communication, NAT (Network Address Translation) technology is usually used for security reasons or to save IP addresses. The principle of NAT technology is that when network packets pass through a NAT device, the NAT device will modify the Some content of these data packets is modified and then forwarded to the network. At the same time, the NAT device will make a record for this modification. When the response data packet is returned, the NAT device will modify the returned data packet to an intranet device according to the record. packets that can be identified. [0003] NAT technology can also cause a problem. The public network device cannot initiate a connection to the private network device actively, because before the NAT operat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L61/2503H04L61/5007H04L67/562H04L67/565
CPCH04L61/2503
Inventor 夏宇
Owner 夏宇
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products